NEW QUESTION 70Which of the following is not an example of weaponization?

A. Connecting to a command and control serverB. Wrapping software with a RATC. Creating a backdoor in an applicationD. Developing an automated script to inject commands on a USB device

Answer: A

NEW QUESTION 71Which of the following are core responsibilities of a national CSIRT and CERT?

A. Provide solutions for bug bountiesB. Protect their citizens by providing security vulnerability information, security awareness training, best practices, and other informationC. Provide vulnerability brokering to vendors within a countryD. Create regulations around cybersecurity within the country